Vulnerability Name:

CVE-2020-10755 (CCN-184635)

Assigned:2020-06-10
Published:2020-06-10
Updated:2021-10-26
Summary:An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-522
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2020-10755

Source: CCN
Type: Red Hat Bugzilla – Bug 1842748
(CVE-2020-10755) - CVE-2020-10755 openstack-cinder: Improper handling of ScaleIO backend credentials

Source: CONFIRM
Type: Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10755

Source: XF
Type: UNKNOWN
openstack-cve202010755-info-disc(184635)

Source: CCN
Type: Ubuntu CVE Tracker
CVE-2020-10755

Source: UBUNTU
Type: Third Party Advisory
USN-4420-1

Source: CCN
Type: OSSN/OSSN-0086
Dell EMC ScaleIO/VxFlex OS Backend Credentials Exposure

Source: MISC
Type: Vendor Advisory
https://wiki.openstack.org/wiki/OSSN/OSSN-0086

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:openstack-cinder:*:*:*:*:*:*:*:* (Version < 14.1.0)
  • OR cpe:/a:redhat:openstack-cinder:*:*:*:*:*:*:*:* (Version >= 15.0.0 and < 15.2.0)
  • OR cpe:/a:redhat:openstack-cinder:*:*:*:*:*:*:*:* (Version >= 16.0.0 and < 16.1.0)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openstack:cinder:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:202010755
    V
    CVE-2020-10755
    2022-05-22
    BACK
    redhat openstack-cinder *
    redhat openstack-cinder *
    redhat openstack-cinder *
    canonical ubuntu linux 18.04
    canonical ubuntu linux 20.04
    openstack cinder *